/src/main/java/com/cloudhopper/smpp/ssl/SslConfiguration.java

http://github.com/twitter/cloudhopper-smpp · Java · 609 lines · 262 code · 83 blank · 264 comment · 6 complexity · dbef6c96028548150b11327177e1bc16 MD5 · raw file

  1. package com.cloudhopper.smpp.ssl;
  2. /*
  3. * #%L
  4. * ch-smpp
  5. * %%
  6. * Copyright (C) 2009 - 2013 Cloudhopper by Twitter
  7. * %%
  8. * Licensed under the Apache License, Version 2.0 (the "License");
  9. * you may not use this file except in compliance with the License.
  10. * You may obtain a copy of the License at
  11. *
  12. * http://www.apache.org/licenses/LICENSE-2.0
  13. *
  14. * Unless required by applicable law or agreed to in writing, software
  15. * distributed under the License is distributed on an "AS IS" BASIS,
  16. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  17. * See the License for the specific language governing permissions and
  18. * limitations under the License.
  19. * #L%
  20. */
  21. import java.security.SecureRandom;
  22. import java.security.Security;
  23. import java.util.Arrays;
  24. import java.util.Collection;
  25. import java.util.HashSet;
  26. import java.util.Set;
  27. import javax.net.ssl.SSLContext;
  28. import javax.net.ssl.SSLEngine;
  29. import javax.net.ssl.TrustManagerFactory;
  30. /**
  31. * Configuration for SSL.
  32. *
  33. * @author garth
  34. */
  35. public class SslConfiguration
  36. {
  37. public static final String DEFAULT_KEYMANAGERFACTORY_ALGORITHM =
  38. (Security.getProperty("ssl.KeyManagerFactory.algorithm") == null ?
  39. "SunX509" : Security.getProperty("ssl.KeyManagerFactory.algorithm"));
  40. public static final String DEFAULT_TRUSTMANAGERFACTORY_ALGORITHM =
  41. (Security.getProperty("ssl.TrustManagerFactory.algorithm") == null ?
  42. "SunX509" : Security.getProperty("ssl.TrustManagerFactory.algorithm"));
  43. private final Set<String> excludeProtocols = new HashSet<String>();
  44. private Set<String> includeProtocols = null;
  45. private final Set<String> excludeCipherSuites = new HashSet<String>();
  46. private Set<String> includeCipherSuites = null;
  47. private String keyStorePath;
  48. private String keyStoreProvider;
  49. private String keyStoreType = "JKS";
  50. private String trustStorePath;
  51. private String trustStoreProvider;
  52. private String trustStoreType = "JKS";
  53. private transient String keyStorePassword;
  54. private transient String trustStorePassword;
  55. private transient String keyManagerPassword;
  56. private String certAlias;
  57. private boolean needClientAuth = false;
  58. private boolean wantClientAuth = false;
  59. private boolean allowRenegotiate = true;
  60. private String sslProvider;
  61. private String sslProtocol = "TLS";
  62. private String secureRandomAlgorithm;
  63. private String keyManagerFactoryAlgorithm = DEFAULT_KEYMANAGERFACTORY_ALGORITHM;
  64. private String trustManagerFactoryAlgorithm = DEFAULT_TRUSTMANAGERFACTORY_ALGORITHM;
  65. private boolean validateCerts;
  66. private boolean validatePeerCerts;
  67. private int maxCertPathLength = -1;
  68. private String crlPath;
  69. private boolean enableCRLDP = false;
  70. private boolean enableOCSP = false;
  71. private String ocspResponderURL;
  72. private boolean sessionCachingEnabled = true;
  73. private int sslSessionCacheSize;
  74. private int sslSessionTimeout;
  75. private boolean trustAll = true;
  76. /**
  77. * @return The array of protocol names to exclude from
  78. * {@link SSLEngine#setEnabledProtocols(String[])}
  79. */
  80. public String[] getExcludeProtocols() {
  81. return this.excludeProtocols == null ? null :
  82. this.excludeProtocols.toArray(new String[this.excludeProtocols.size()]);
  83. }
  84. /**
  85. * @param protocols The array of protocol names to exclude from
  86. * {@link SSLEngine#setEnabledProtocols(String[])}
  87. */
  88. public void setExcludeProtocols(String... protocols) {
  89. this.excludeProtocols.clear();
  90. this.excludeProtocols.addAll(Arrays.asList(protocols));
  91. }
  92. /**
  93. * @param protocol Protocol names to add to {@link SSLEngine#setEnabledProtocols(String[])}
  94. */
  95. public void addExcludeProtocols(String... protocol) {
  96. this.excludeProtocols.addAll(Arrays.asList(protocol));
  97. }
  98. /**
  99. * @return The array of protocol names to include in
  100. * {@link SSLEngine#setEnabledProtocols(String[])}
  101. */
  102. public String[] getIncludeProtocols() {
  103. return this.includeProtocols == null ? null :
  104. this.includeProtocols.toArray(new String[this.includeProtocols.size()]);
  105. }
  106. /**
  107. * @param protocols The array of protocol names to include in
  108. * {@link SSLEngine#setEnabledProtocols(String[])}
  109. */
  110. public void setIncludeProtocols(String... protocols) {
  111. this.includeProtocols = new HashSet<String>(Arrays.asList(protocols));
  112. }
  113. /**
  114. * @return The array of cipher suite names to exclude from
  115. * {@link SSLEngine#setEnabledCipherSuites(String[])}
  116. */
  117. public String[] getExcludeCipherSuites() {
  118. return this.excludeCipherSuites == null ? null :
  119. this.excludeCipherSuites.toArray(new String[this.excludeCipherSuites.size()]);
  120. }
  121. /**
  122. * @param cipherSuites The array of cipher suite names to exclude from
  123. * {@link SSLEngine#setEnabledCipherSuites(String[])}
  124. */
  125. public void setExcludeCipherSuites(String... cipherSuites) {
  126. this.excludeCipherSuites.clear();
  127. this.excludeCipherSuites.addAll(Arrays.asList(cipherSuites));
  128. }
  129. /**
  130. * @param cipher Cipher names to add to {@link SSLEngine#setEnabledCipherSuites(String[])}
  131. */
  132. public void addExcludeCipherSuites(String... cipher) {
  133. this.excludeCipherSuites.addAll(Arrays.asList(cipher));
  134. }
  135. /**
  136. * @return The array of cipher suite names to include in
  137. * {@link SSLEngine#setEnabledCipherSuites(String[])}
  138. */
  139. public String[] getIncludeCipherSuites() {
  140. return this.includeCipherSuites == null ? null:
  141. this.includeCipherSuites.toArray(new String[this.includeCipherSuites.size()]);
  142. }
  143. /**
  144. * @param cipherSuites The array of cipher suite names to include in
  145. * {@link SSLEngine#setEnabledCipherSuites(String[])}
  146. */
  147. public void setIncludeCipherSuites(String... cipherSuites) {
  148. this.includeCipherSuites = new HashSet<String>(Arrays.asList(cipherSuites));
  149. }
  150. /**
  151. * @return The file or URL of the SSL Key store.
  152. */
  153. public String getKeyStorePath() {
  154. return this.keyStorePath;
  155. }
  156. /**
  157. * @param keyStorePath The file or URL of the SSL Key store.
  158. */
  159. public void setKeyStorePath(String keyStorePath) {
  160. this.keyStorePath = keyStorePath;
  161. }
  162. /**
  163. * @return The provider of the key store
  164. */
  165. public String getKeyStoreProvider() {
  166. return this.keyStoreProvider;
  167. }
  168. /**
  169. * @param keyStoreProvider The provider of the key store
  170. */
  171. public void setKeyStoreProvider(String keyStoreProvider) {
  172. this.keyStoreProvider = keyStoreProvider;
  173. }
  174. /**
  175. * @return The type of the key store (default "JKS")
  176. */
  177. public String getKeyStoreType() {
  178. return this.keyStoreType;
  179. }
  180. /**
  181. * @param keyStoreType The type of the key store (default "JKS")
  182. */
  183. public void setKeyStoreType(String keyStoreType) {
  184. this.keyStoreType = keyStoreType;
  185. }
  186. /**
  187. * @return Alias of SSL certificate for the connector
  188. */
  189. public String getCertAlias() {
  190. return this.certAlias;
  191. }
  192. /**
  193. * @param certAlias Alias of SSL certificate for the connector
  194. */
  195. public void setCertAlias(String certAlias) {
  196. this.certAlias = certAlias;
  197. }
  198. /**
  199. * @return The file name or URL of the trust store location
  200. */
  201. public String getTrustStorePath() {
  202. return this.trustStorePath;
  203. }
  204. /**
  205. * @param trustStorePath The file name or URL of the trust store location
  206. */
  207. public void setTrustStorePath(String trustStorePath) {
  208. this.trustStorePath = trustStorePath;
  209. }
  210. /**
  211. * @return The provider of the trust store
  212. */
  213. public String getTrustStoreProvider() {
  214. return this.trustStoreProvider;
  215. }
  216. /**
  217. * @param trustStoreProvider The provider of the trust store
  218. */
  219. public void setTrustStoreProvider(String trustStoreProvider) {
  220. this.trustStoreProvider = trustStoreProvider;
  221. }
  222. /**
  223. * @return The type of the trust store (default "JKS")
  224. */
  225. public String getTrustStoreType() {
  226. return this.trustStoreType;
  227. }
  228. /**
  229. * @param trustStoreType The type of the trust store (default "JKS")
  230. */
  231. public void setTrustStoreType(String trustStoreType) {
  232. this.trustStoreType = trustStoreType;
  233. }
  234. /**
  235. * @return True if SSL needs client authentication.
  236. * @see SSLEngine#getNeedClientAuth()
  237. */
  238. public boolean getNeedClientAuth() {
  239. return this.needClientAuth;
  240. }
  241. /**
  242. * @param needClientAuth True if SSL needs client authentication.
  243. */
  244. public void setNeedClientAuth(boolean needClientAuth) {
  245. this.needClientAuth = needClientAuth;
  246. }
  247. /**
  248. * @return True if SSL wants client authentication.
  249. * @see SSLEngine#getWantClientAuth()
  250. */
  251. public boolean getWantClientAuth() {
  252. return this.wantClientAuth;
  253. }
  254. /**
  255. * @param wantClientAuth True if SSL wants client authentication.
  256. */
  257. public void setWantClientAuth(boolean wantClientAuth) {
  258. this.wantClientAuth = wantClientAuth;
  259. }
  260. /**
  261. * @return true if SSL certificate has to be validated
  262. */
  263. public boolean isValidateCerts() {
  264. return this.validateCerts;
  265. }
  266. /**
  267. * @param validateCerts true if SSL certificates have to be validated
  268. */
  269. public void setValidateCerts(boolean validateCerts) {
  270. this.validateCerts = validateCerts;
  271. }
  272. /**
  273. * @return true if SSL certificates of the peer have to be validated
  274. */
  275. public boolean isValidatePeerCerts() {
  276. return this.validatePeerCerts;
  277. }
  278. /**
  279. * @param validatePeerCerts true if SSL certificates of the peer have to be validated
  280. */
  281. public void setValidatePeerCerts(boolean validatePeerCerts) {
  282. this.validatePeerCerts = validatePeerCerts;
  283. }
  284. /**
  285. * @return True if SSL re-negotiation is allowed (default false)
  286. */
  287. public boolean isAllowRenegotiate() {
  288. return this.allowRenegotiate;
  289. }
  290. /**
  291. * Set if SSL re-negotiation is allowed. CVE-2009-3555 discovered
  292. * a vulnerability in SSL/TLS with re-negotiation. If your JVM
  293. * does not have CVE-2009-3555 fixed, then re-negotiation should
  294. * not be allowed. CVE-2009-3555 was fixed in Sun java 1.6 with a ban
  295. * of renegotiates in u19 and with RFC5746 in u22.
  296. *
  297. * @param allowRenegotiate
  298. * true if re-negotiation is allowed (default false)
  299. */
  300. public void setAllowRenegotiate(boolean allowRenegotiate) {
  301. this.allowRenegotiate = allowRenegotiate;
  302. }
  303. /**
  304. * @param password The password for the key store
  305. */
  306. public void setKeyStorePassword(String password) {
  307. this.keyStorePassword = password;
  308. }
  309. /**
  310. * @return The password for the key store
  311. */
  312. public String getKeyStorePassword() {
  313. return this.keyStorePassword;
  314. }
  315. /**
  316. * @param password The password (if any) for the specific key within the key store
  317. */
  318. public void setKeyManagerPassword(String password) {
  319. this.keyManagerPassword = password;
  320. }
  321. /**
  322. * @return The password (if any) for the specific key within the key store
  323. */
  324. public String getKeyManagerPassword() {
  325. return this.keyManagerPassword;
  326. }
  327. /**
  328. * @param password The password for the trust store
  329. */
  330. public void setTrustStorePassword(String password) {
  331. this.trustStorePassword = password;
  332. }
  333. /**
  334. * @return The password for the trust store
  335. */
  336. public String getTrustStorePassword() {
  337. return this.trustStorePassword;
  338. }
  339. /**
  340. * @return The SSL provider name, which if set is passed to
  341. * {@link SSLContext#getInstance(String, String)}
  342. */
  343. public String getProvider() {
  344. return this.sslProvider;
  345. }
  346. /**
  347. * @param provider The SSL provider name, which if set is passed to
  348. * {@link SSLContext#getInstance(String, String)}
  349. */
  350. public void setProvider(String provider) {
  351. this.sslProvider = provider;
  352. }
  353. /**
  354. * @return The SSL protocol (default "TLS") passed to
  355. * {@link SSLContext#getInstance(String, String)}
  356. */
  357. public String getProtocol() {
  358. return this.sslProtocol;
  359. }
  360. /**
  361. * @param protocol The SSL protocol (default "TLS") passed to
  362. * {@link SSLContext#getInstance(String, String)}
  363. */
  364. public void setProtocol(String protocol) {
  365. this.sslProtocol = protocol;
  366. }
  367. /**
  368. * @return The algorithm name, which if set is passed to
  369. * {@link SecureRandom#getInstance(String)} to obtain the {@link SecureRandom} instance passed to
  370. * {@link SSLContext#init(javax.net.ssl.KeyManager[], javax.net.ssl.TrustManager[], SecureRandom)}
  371. */
  372. public String getSecureRandomAlgorithm() {
  373. return this.secureRandomAlgorithm;
  374. }
  375. /**
  376. * @param algorithm The algorithm name, which if set is passed to
  377. * {@link SecureRandom#getInstance(String)} to obtain the {@link SecureRandom} instance passed to
  378. * {@link SSLContext#init(javax.net.ssl.KeyManager[], javax.net.ssl.TrustManager[], SecureRandom)}
  379. */
  380. public void setSecureRandomAlgorithm(String algorithm) {
  381. this.secureRandomAlgorithm = algorithm;
  382. }
  383. /**
  384. * @return The algorithm name (default "SunX509") used by the {@link KeyManagerFactory}
  385. */
  386. public String getKeyManagerFactoryAlgorithm() {
  387. return this.keyManagerFactoryAlgorithm;
  388. }
  389. /**
  390. * @param algorithm The algorithm name (default "SunX509") used by the {@link KeyManagerFactory}
  391. */
  392. public void setKeyManagerFactoryAlgorithm(String algorithm) {
  393. this.keyManagerFactoryAlgorithm = algorithm;
  394. }
  395. /**
  396. * @return The algorithm name (default "SunX509") used by the {@link TrustManagerFactory}
  397. */
  398. public String getTrustManagerFactoryAlgorithm() {
  399. return this.trustManagerFactoryAlgorithm;
  400. }
  401. /**
  402. * @return True if all certificates should be trusted if there is no KeyStore or TrustStore
  403. */
  404. public boolean isTrustAll() {
  405. return this.trustAll;
  406. }
  407. /**
  408. * @param trustAll True if all certificates should be trusted if there is no KeyStore or TrustStore
  409. */
  410. public void setTrustAll(boolean trustAll) {
  411. this.trustAll = trustAll;
  412. }
  413. /**
  414. * @param algorithm The algorithm name (default "SunX509") used by the {@link TrustManagerFactory}
  415. * Use the string "TrustAll" to install a trust manager that trusts all.
  416. */
  417. public void setTrustManagerFactoryAlgorithm(String algorithm) {
  418. this.trustManagerFactoryAlgorithm = algorithm;
  419. }
  420. /**
  421. * @return Path to file that contains Certificate Revocation List
  422. */
  423. public String getCrlPath() {
  424. return this.crlPath;
  425. }
  426. /**
  427. * @param crlPath Path to file that contains Certificate Revocation List
  428. */
  429. public void setCrlPath(String crlPath) {
  430. this.crlPath = crlPath;
  431. }
  432. /**
  433. * @return Maximum number of intermediate certificates in
  434. * the certification path (-1 for unlimited)
  435. */
  436. public int getMaxCertPathLength() {
  437. return this.maxCertPathLength;
  438. }
  439. /**
  440. * @param maxCertPathLength maximum number of intermediate certificates in
  441. * the certification path (-1 for unlimited)
  442. */
  443. public void setMaxCertPathLength(int maxCertPathLength) {
  444. this.maxCertPathLength = maxCertPathLength;
  445. }
  446. /**
  447. * @return true if CRL Distribution Points support is enabled
  448. */
  449. public boolean isEnableCRLDP() {
  450. return this.enableCRLDP;
  451. }
  452. /**
  453. * Enables CRL Distribution Points Support
  454. * @param enableCRLDP true - turn on, false - turns off
  455. */
  456. public void setEnableCRLDP(boolean enableCRLDP) {
  457. this.enableCRLDP = enableCRLDP;
  458. }
  459. /**
  460. * @return true if On-Line Certificate Status Protocol support is enabled
  461. */
  462. public boolean isEnableOCSP() {
  463. return this.enableOCSP;
  464. }
  465. /**
  466. * Enables On-Line Certificate Status Protocol support
  467. * @param enableOCSP true - turn on, false - turn off
  468. */
  469. public void setEnableOCSP(boolean enableOCSP) {
  470. this.enableOCSP = enableOCSP;
  471. }
  472. /**
  473. * @return Location of the OCSP Responder
  474. */
  475. public String getOcspResponderURL() {
  476. return this.ocspResponderURL;
  477. }
  478. /**
  479. * Set the location of the OCSP Responder.
  480. * @param ocspResponderURL location of the OCSP Responder
  481. */
  482. public void setOcspResponderURL(String ocspResponderURL) {
  483. this.ocspResponderURL = ocspResponderURL;
  484. }
  485. /**
  486. * @return true if SSL Session caching is enabled
  487. */
  488. public boolean isSessionCachingEnabled() {
  489. return this.sessionCachingEnabled;
  490. }
  491. /**
  492. * Set the flag to enable SSL Session caching.
  493. * @param enableSessionCaching the value of the flag
  494. */
  495. public void setSessionCachingEnabled(boolean enableSessionCaching) {
  496. this.sessionCachingEnabled = enableSessionCaching;
  497. }
  498. /**
  499. * Get SSL session cache size.
  500. * @return SSL session cache size
  501. */
  502. public int getSslSessionCacheSize() {
  503. return this.sslSessionCacheSize;
  504. }
  505. /**
  506. * Set SSL session cache size.
  507. * @param sslSessionCacheSize SSL session cache size to set
  508. */
  509. public void setSslSessionCacheSize(int sslSessionCacheSize) {
  510. this.sslSessionCacheSize = sslSessionCacheSize;
  511. }
  512. /**
  513. * Get SSL session timeout.
  514. * @return SSL session timeout
  515. */
  516. public int getSslSessionTimeout() {
  517. return this.sslSessionTimeout;
  518. }
  519. /**
  520. * Set SSL session timeout.
  521. * @param sslSessionTimeout SSL session timeout to set
  522. */
  523. public void setSslSessionTimeout(int sslSessionTimeout) {
  524. this.sslSessionTimeout = sslSessionTimeout;
  525. }
  526. }